About your Search

20130420
20130420
Search Results 0 to 2 of about 3
are trying to get a handle on, we know the russian fis, foreign intelligence service taxed the fbi and asked them to do investigation on the 26-year-old here. reasonable to believe they ask us to do it here, they may have done it there or may have had a region, a quantum leap there, as jim was talking about, where will you develop those bomb-making skills? you don't go to m.i.t. to learn,build pressure cooker bombs, do you go to the caucuses, do you go to that area of the world where these devices have been used successfully to attack humanity for year upon year upon year. so i think that six-month period, the russians help us in that we may be able to identify who he was working with and gone to perhaps some type of terroristic training, bomb making school. realize the two brothers set some place. they built multiple pressure cooker bombs, built these hand-held devices. they did a lot. we have had fwhoermts u.s. try to blow their underwear up, try to blow their shoes up, try to blow their car up and they weren't successful, thank god. >> you think this goes beyond what they could pick up on
electronically that i haven't been up front with my taxes. this would prevent d.h.s. from say sharing that information with guest: the private companies in sharing information, the biggest concern is -- individuals are concerned that their private information within the cyber networks orson dems would be held -- or systems would be held by private companies but then provided to the government , that this private information would not be stripped by the companies first. in the president's executive order, the onus would be on the privacy advocates. they want the private companies to strip any private information that might be caught up within the context of cyber threat information. thet one has to understand definition of cyber threat. it is unlikely but not impossible that your private tax information, your e-mail content would be part of that information that is a cyber threat information that would be given to the government. is there a possibility that it would be lumped in with that? yes. so whose responsibility is it to minimize and get rid of your private information? the bill
of it comes from the drug trade. some probably 35 or 40%. some money comes from illicit taxes from afghan people and some money comes from external support from outside the region. >> when you look at the places that they go in pakistan, the frontier areas, double pakistan, -- do you believe pakistan, number one, has control over those areas and number two, can control over those areas? >> senator, pakistan does not have control over those areas right now. they have had over 15,000 killed and wounded in operations in that area over the past decade. they've had hundreds killed and wounded in the past several weeks as they've tried to gain control in the khyber area. i think that's a clear indication they cannot control the border area and the taliban that are operating freely inside of that border area. >> what do you see as a rule for the taliban, if any, in the future afghan government as we transition out, as discussions are taking place. how do you envision that future afghan government? obviously there are elections coming up but how are we looking at the transition for the afghan gov
Search Results 0 to 2 of about 3